Help Wanted: Chief Marketing Technology Officer

September 28, 2015

A new, indispensable position for companies is the chief technology officer or the chief information officer. Their primary responsibilities are to manage the IT department, implement new ways to manage information, and/or develop software as needed. There is a new position that companies will be creating in the future and the title is chief marketing technology officer, says Live Mint in “Make Way CIOS, CMOS: Here Comes The CMTO.”

Formerly the marketing and IT departments never mixed, except for the occasional social media collaboration. Marketers are increasing their reliance on technology to understand their customers and it goes far beyond social media. Marketers need to be aware of the growing trends in mobile shopping and search, digital analytics, gamification, online communities, and the power of user-generated content.

“The CMO’s role will graduate to CMTO, a marketer with considerable knowledge of technology. The CMTO, according to Nasscom, will not only conceptualize but also build solutions and lay down the technical and commercial specifications while working alongside the IT team on vendor selection.”

It is not enough to know how to market a product or promote an organization. Marketers need to be able to engage with technology and understand how to implement to attract modern customers and increase sales. In other words, evolving the current marketing position with a new buzzword.

Whitney Grace, September 28, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Watch Anti-Money Laundering Compliances Sink

September 25, 2015

With a title like “AML-A Challenge Of Titanic Proportions” posted on Attivio metaphoric comparisons between the “ship of dreams” and icebergs is inevitable.  Anti-money laundering compliances have seen an unprecedented growth between 2011-2014 of 53%, says KPMG’s Global Anti-Money Laundering (AML) Survey.  The costs are predicted to increase by more than 25% in the next three years.  The biggest areas that are requiring more money, include transaction monitoring systems, Know Your Customer systems, and recruitment/retention systems for AML staff.

The Titanic metaphor plays in as the White Star Line director Bruce Ismay, builder Thomas Andrew, and nearly all of the 3327 passengers believed the ship was unsinkable and the pinnacle of modern technology.  The belief that humanity’s efforts would conquer Mother Nature was its downfall.  The White Star Line did not prepare the Titanic for disaster, but AML companies are trying to prevent their ships are sinking.  Except they cannot account for all the ways thieves can work around their system, just as the Titanic could not avoid the iceberg.

“Systems need to be smarter – even capable of learning patterns of transaction and ownership.  Staff needs more productive ways of investigating and positively concluding their caseload.  Alerting methods need to generate fewer ‘false positives’ – reducing the need for costly human investigation. New sources of information that can provide evidence need to come online faster and quickly correlate with existing data sources.”

The Titanic crew accidentally left the binoculars for the crow’s nest in England, which did not help the lookouts.  The current AML solutions are like the forgotten binoculars and pervasive action needs to be taken to avoid the AML iceberg.

Whitney Grace, September 25, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Rundown on Legal Knowledge Management

September 24, 2015

One of the new legal buzzwords is knowledge management and not just old-fashioned knowledge management, but rather quick, efficient, and effective.  Time is an expensive commodity for legal professionals, especially with the amount of data they have to sift through for cases.  Mondaq explains the importance of knowledge management for law professionals in the article, “United States: A Brief Overview Of Legal Knowledge Management.”

Knowledge management first started in creating an effective process for managing, locating, and searching relevant files, but it quickly evolved into implementing a document managements system.  While knowledge management companies offered law practices decent document management software to tackle the data hill, an even bigger problem arose. The law practices needed a dedicated person to be software experts:

“Consequently, KM emphasis had to shift from finding documents to finding experts. The expert could both identify useful documents and explain their context and use. Early expertise location efforts relied primarily on self-rating. These attempts almost always failed because lawyers would not participate and, if they did, they typically under- or over-rated themselves.”

The biggest problem law professional face is that they might invest a small fortune in a document management license, but they do not know how to use the software or do not have the time to learn.  It is a reminder that someone might have all the knowledge and best tools at their fingertips, but unless people have the knowledge on how to use and access it, the knowledge is useless.

Whitney Grace, September 24, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Healthcare.gov: The Search for Functional Management via Training

September 21, 2015

I read “How Healthcare.gov Botched $600 Million worth of Contracts.” My initial reaction was that the $600 million figure understated the fully loaded costs of the Web site. I have zero evidence about my view that $600 million was the incorrect total. I do have a tiny bit of experience in US government project work, including assignments to look into accounting methods in procurements.

The write up explains that a an audit by the Office of the Health and Human Services office of Inspector General identified the root causes of the alleged $600 million Healthcare.gov Web site. The source document was online when I checked on September 21, 2015, at this link. If you want this document, I suggest you download it. Some US government links become broken when maintenance, interns, new contractors, or site redesigns are implemented.

The news story, which is the hook for this blog post, does a good job of pulling out some of the data from the IG’s report; for example, a list of “big contractors behind Healthcare.gov.” The list contains few surprises. Many of the names of companies were familiar to me, including that of Booz, Allen, where I once labored on a range of projects. There are references to additional fees from scope changes. I am confident, gentle reader, that you are familiar with scope creep. The idea is that the client, in the case of Healthcare.gov, needed to modify the tasks in the statement of work which underpins the contracts issued to the firms which perform the work. The government method is to rely on contractors for heavy lifting. The government professionals handle oversight, make certain the acquisition guidelines are observed, and plug assorted types of data into various US government back office systems.

The news story repeated the conclusion of the IG’s report that better training was need to make the Healthcare.gov type of project work better in the future.

My thoughts are that the news story ignored several important factors which in my experience provided the laboratory in which this online commerce experiment evolved.

First, the notion of a person in charge is not one that I encountered too often in my brushes with the US government. Many individuals change jobs, rotating from assignment to assignment, so newcomers are often involved after a train has left the station. In this type of staffing environment, the enthusiasm for digging deep and re-rigging the ship is modest or secondary to other tasks such as working on budgets for the next fiscal year, getting involved in new projects, or keeping up with the meetings which comprise the bulk of a professional’s work time. In short, decisions are not informed by a single individual with a desire to accept responsibility for a project. The ship sails on, moved by the winds of decisions by those with different views of the project. The direction emerges.

Second, the budget mechanisms are darned interesting. Money cannot be spent until the project is approved and the estimated funds are actually transferred to an account which can be used to pay a contractor. The process requires that individuals who may have never worked on a similar project create a team which involves various consultants, White House fellows, newly appointed administrators, procurement specialists with law degrees, or other professionals to figure out what is going to be done, how, what time will be allocated and converted to estimates of cost, and the other arcana of a statement of work. The firms who make a living converting statements of work into proposals to do the actual work. At this point, the disconnect between the group which defined the SOW and the firms bidding on the work becomes the vendor selection process. I will not explore vendor selection, an interesting topic outside the scope of this blog post. Vendors are selected and contracts written. Remember that the estimates, the timelines, and the functionality now have to be converted into the Healthcare.gov site or the F-35 aircraft or some other deliverable. What happens if the SOW does not match reality? The answer is a non functioning version of Healthcare.gov. The cause, gentle reader, is not training.

Third, the vendors, bless their billable hearts, now have to take the contract which spells out exactly what the particular vendor is to do and then actually do it. What happens if the SOW gets the order of tasks wrong in terms of timing? The vendors do the best they can. Vendors document what they do, submit invoices, and attend meetings. When multiple vendors are involved, the meetings with oversight professionals are not the places to speak in plain English about the craziness of the requirements or the tasks specified in the contract. The vendors do their work to the best of their ability. When the time comes for different components to be hooked together, the parts usually require some tweaking. Think rework. Scope change required. When the go live date arrives, the vendors flip the switches for their part of the project and individuals try to use the system. When these systems do not work, the problem is a severe one. Once again: training is not the problem. The root cause is that the fundamental assumptions about a project were flawed from the git go.

Is there a fix? In the case of Healthcare.gov, there was. The problem was solved by creating the equivalent of a technical SWAT team, working in a very flexible manner with procurement requirements, and allocating money without the often uninformed assumptions baked into a routine procurement.

Did the fix cost money? Yes, do I know how much? No. My hunch is that there is zero appetite in the US government, at a “real” news service, a watchdog entity, or an in house accountant to figure out the total spent for Healthcare.gov. Why do I know this? The accounting systems in use by most government entities are not designed to roll up direct and indirect costs with a mouse click. Costs are scattered and methods of payment pretty darned crazy.

Net net: Folks can train all day long. If that training focuses on systems and methods which are disconnected from the deliverable, the result is inefficiency, a lack of accountability, and misdirection from the root cause of a problem.

I have been involved in various ways with government work in the US since the early 1970s. One thing remains consistent: The foundational activities are uneven. Will the procurement process change? Forty years ago I used to think that the system would evolve. I was wrong.

Stephen E Arnold, September 21, 2015

Brand-New Watson Health Unit Has Boston Buzzing

September 17, 2015

The article titled IBM Watson Health Unit Begins to Take Shape on TechCrunch investigates the work being done to initiate the new healthcare unit in Boston and surrounding community that IBM hopes to use to address major issues in healthcare. Already this year IBM has purchased and partnered with numerous companies in the field. Recently, Boston Children’s Hospital joined the list as well as Apple and Johnson & Johnson. The article states,

“As part of today’s broad announcement, IBM indicated that it would be working with Sage Bionetworks’ Open Biomedical Research Platform around the first Apple projects. Sage will be collecting information from Apple Devices using ResearchKit developer tools, initially with breast cancer and Parkinson’s patients. It will be aggregating storing, curating and analyzing the information coming in from the Apple Devices. IBM will be providing the underlying technology with its IBM Watson Health Cloud platform.”

Additionally, IBM Watson Health Cloud for Life Science Compliance was also announced, as the cherry built on top of IBM Softlayer. It is designed to aid companies in the life science industry with a fully compliant cloud solution capable of meeting the demands of the heavily regulated field. Not mentioned in the article is any mention of what the revenues are for this Health Unit initiative, as if they are entirely irrelevant.

Chelsea Kerwin, September 17, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Big Data: Trade Offs Necessary

September 14, 2015

i read “How to Balance the Five Analytic Dimensions.” The article presents information which reminded me of a college professor’s introductory lecture about data analysis.

The basics are definitely important. As the economy slips toward 2016, the notion of trade offs is an important one to keep in mind. According to the article, making sense of data via analytics involves understanding and balancing:

  1. The complexity of the data. Yep, data are often complex.
  2. Speed. Yep, getting results when the outputs are needed is important.
  3. The complexity of the analytics. Yep, adding a column of numbers and calculating the mean may be easy but not what the data doctor ordered.
  4. Accuracy and precision. The idea is that some outputs may be inappropriate for the task at hand. In theory, results should be accurate, or at least accurate enough.
  5. Data size. Yep, crunching lots of data can entail a number of “big” and “complex” tasks.

I agree with these points.

The problem is that the success of a big or small data project with simple or complex analytics is different from a laundry list of points to keep in mind. Knowing the five points is helpful if one is taking a test in a junior college information management class.

The write up does not address the rock upon which many analytics project crashes; that is:

What are the systems and methods for balancing resources across these five dimensions?

Without addressing this fundamental question, how can good decisions be made when the foundation is assumed to be level and stable?

Most analytics work just like the textbook said they would. The outputs are often baloney because the underlying assumptions were assumed to be spot on.

Why not just guess and skip the lecture? I know. Is this an acceptable answer: “That’s too time consuming and above our pay grade”?

The professional who offers this answer may get an A in class but an F in decision making.

Stephen E Arnold, September 14, 2015

Big Data Shockers: Not Big

September 14, 2015

I read “Big Data Doesn’t Exist.” Now “data” is plural, but why get involved in grammar. This is the mobile, thumb typing era.

The write up states:

I’ve found it’s a good rule of thumb to assume a company has one one-thousandth of the data they say they do.

Yep, the data perception anomaly is alive and well. The folks who have too much data are too busy as well. Many of the individuals with whom I come in contact have no time to think new thoughts, complete projects on time, return phone calls, or answer email. Quartz offers “We’re Not Actually That Busy, But We’re Great at Pretending We Are.”

The factors causing the razzle dazzled view of an organization’s data and busy-ness are similar. The inability to look at information or tasks from an informed vantage point creates uncertainty. The easiest way to escape criticism for a strategic failure is to embrace a crazy generalization and protest too much about work that must be completed.

Hence, there is a boom in time management and automatic scheduling. I hear, “My calendar is full.” No kidding. That tells me the person has abrogated responsibility.

The statement that “we have too much data” underscores the individual’s inability to think about information in a way that is helpful. The consequence is the mad dash to software that does the thinking for a professional. There are visualization tools. These make it easy to see what the data allegedly say.

Baloney.

Both the craziness about Big Data and the too much to do approach to work are cover ups.

The issue is rooted deep within many individuals who are unable to cope with the mundane activities of life in the 21st century. The fix is within individuals. Stated another way, there is no fix when there is little or no incentive or desire to take responsibility for work.

I asked a Kentucky Fried Chicken store clerk, “Why do I have to wait for the biscuits to be cooked before I can have two pieces of chicken for my beloved boxers?” The boxers don’t eat biscuits on my watch.

The answer, “That’s what I was told.” Judgment and the instinct to use common sense is absent in the executive suite just as it is at retail fast food outlets.

No sale. Many professionals want a short cut and no responsibility. That’s a mushy foundation for a digital work ethic. Analytics will miss this important nuance when it processes declining revenues.

Stephen E Arnold

Its Hacker Season

August 21, 2015

One of the quintessential cartoon feuds exists between Bugs Bunny and Daffy Duck as they argue whether or not it is duck or rabbit hunting season.  Whoever wins gets the lovely prize of having their face blown off, thankfully cartoon violence does not obey the rules of life and death.  The ensuing argument ends with hilarious consequences, but everyday another type of big game is always in season: your personal information.  Hackers are constantly searching for ways to break into vulnerable systems and steal valuable information.

One a personal level it is frightening to be hacked, but corporations stand risk millions of dollars, customer information, trade secrets, and their reputations if their systems get hacked.   There are many companies that specialize in software to prevent potential hackings, but Cybereason offers unique selling points in the article, “Introducing Cybereason: Real-Time Automated Cyber Hunting.”

“This is why Cybereason exists, to bring the fight against hackers off of the frontlines and into the depths of your environment, where they lurk after gaining unnoticed access. Security needs to be about having an ever-watchful eye over your endpoints, servers, and network, and the Cybereason platform will allow you to perform real-time, automated hunting across your entire environment.”

On their Web site they posted a product video that feeds on the US’s culture of fear and they present an Armageddon like situation complete with a female voice over artist with a British accent, a Guy Fawkes mask, and Matrix-like graphics.  My favorite bit is when Cybereason is made to resemble a secret intelligence agency of superheroes.

Despite the clichéd video, it does give a thorough visualization of what Cybereason’s software and services can do.  The fear factor might be a selling point for some clients, but I’d rather hear hard facts and direct solutions.  It takes out the dramatic elements and actually tells me what the product can do for me.  You have to love Cybereason’s ending phrase, “Let the hunt begin.” It makes me want to respond with, “May the odds ever be in your favor.”

Whitney Grace, August 21, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Compare Trump to Lincoln with Watson Personality Insights

August 19, 2015

IBM’s Watson is employing its capabilities in a new and interesting way: BoingBoing asks, “What Does Your Writing Say About You? IBM Watson Personality Insights Will Tell You.” The software derives cognitive and social characteristics about people from their writings, using linguistic analytics. I never thought I’d see a direct, graphically represented comparison between speeches of Donald Trump and Abe Lincoln, but there it is. There are actually some similarities; they’re both businessmen turned politicians, after all. Reporter Andrea James shares Watson’s take on Trump’s “We Need Brain” speech from the recent Republican primary debate:

“You are a bit dependent, somewhat verbose and boisterous. You are susceptible to stress: you are easily overwhelmed in stressful situations. You are emotionally aware: you are aware of your feelings and how to express them. And you are prone to worry: you tend to worry about things that might happen. Your choices are driven by a desire for efficiency. You consider both independence and helping others to guide a large part of what you do. You like to set your own goals to decide how to best achieve them. And you think it is important to take care of the people around you.”

For comparison, see the write-up for the analysis of Lincoln’s Gettysburg Address (rest assured, Lincoln does come out looking better than Trump). The article also supplies this link, where you can submit between 3500 and 6000 words for Watson’s psychoanalysis; as James notes, you can submit writing penned by yourself, a friend, or an enemy (or some random blogger, perhaps.) To investigate the software’s methodology, click here.

Cynthia Murrell, August 19, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Mid Tier Consulting Firm Identifies the New Economy

August 16, 2015

The information economy is officially over. There is a new economy in town, and you need to listen up. I can hear R Lee Ermey, the drill sergeant in Platoon saying, “You are dumb, Private Pyle, but do you expect me to believe that you don’t know left from right?”

I read “Big Data Fades to the Algorithm Economy.” I thought Big Data was the future. Guess I was wrong again. I learned that “Algorithms are all around us.” Gee, I did not know that.

I learned:

For organizations, the opportunity will first center on monetizing their proprietary algorithms by offering licensing to other non-competing organizations. For example, a supply chain company can license its just-in-time logistics algorithms to a refrigerator manufacturer that seeks to partner with a grocery chain to automatically replenish food based on your eating habits. Why invent or slowly develop sophisticated algorithms at huge cost when you can license and implement them quickly at low cost?

There is “fevered questioning” underway. Gee, I did not know that. In my experience, I see more “fevered confusion.”

But the fix is “proprietary algorithms.”

Okay, what is an algorithm?

A formula or set of steps for solving a particular problem. To be an algorithm, a set of rules must be unambiguous and have a clear stopping point. Algorithms can be expressed in any language, from natural languages like English or French to programming languages like FORTRAN.

It seems to me that a procedure qualifies as an algorithm if it works. A proprietary algorithm is, I assume, a trade secret.

I am delighted that math is not involved; otherwise, there is the problem with companies built on procedures endlessly recycled from books like Algorithms in a Nutshell, Algorithms, The Art of Computer Programming, and other standard texts with loads of numerical recipes.

I understand. The mid tier consulting firm is defining a business process as an algorithm. Magic. Well, if Big Data won’t sell – If enterprise search won’t sell — If content management won’t sell, just go with algorithms.

How quickly will McKinsey, Bain, BCG, Booz, and SRI pick up on this conceptual breakthrough? Any moment now. I assume each company’s blue chip consultants know left from right — usually. Other outfits may get confused. Left? Right?

Stephen E Arnold, August 16, 2015

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta